Viral shaming or (shaming, online shaming, public shaming) is a form of cyberbullying involving the public exposure and ridicule of individuals through widespread sharing in social media, typically for behavior which is seen as deviant.
Advances in technological communication have dramatically changed the ways in which social norm enforcement is used to constrain behavior. Viral shaming involves the intentional collection and dissemination of data that are potentially stigmatizing in modes that are widely accessible and in which observers (including members of the public) can often add input.
Shaming has ancient roots, with accounts in the revered writings and holy books of many societies and religions, including those of Charles Dickens and Seneca.
A common feature of online shaming is public humiliation. A challenge is to differentiate between a humbling (rightly knocking someone down a peg for a social transgression) and a humiliation that is an affront to dignity (wrongly knocking someone down a peg). In addition, the privacy concern of shamed individuals is not necessarily about intrusion on seclusion or revelation of embarrassing information, but rather about the disruption in their ability to continue to participate in online spaces free from attack.
In recent years, viral online shaming has cost companies millions, candidates elections, and individuals their careers overnight.
Viral shaming
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
Spreadsheet is a simple worksheet consisting of rows and columns in which any data can be entered. It does calculations and other operation ...
-
In the years since the first WWW applications were developed, there has been an explosion in the global use of the internet. With this growt...
-
When all the circuitry for a digital computer is contained on one integrated circuit, the unit is called a microcomputer. Even though ther...
-
Nowadays shoppers can buy online at their convenience at any time and from anywhere. The World Wide Web provides the basic communication inf...
-
-
The *Auspicious Incident* (*Vaka-i Hayriye*) refers to the dramatic destruction of the Ottoman Janissary corps by Sultan Mahmud II on June 15, 1826. Thou...